KR20140022705A - The safety keeper using the pre registry system - Google Patents

The safety keeper using the pre registry system Download PDF

Info

Publication number
KR20140022705A
KR20140022705A KR1020120089203A KR20120089203A KR20140022705A KR 20140022705 A KR20140022705 A KR 20140022705A KR 1020120089203 A KR1020120089203 A KR 1020120089203A KR 20120089203 A KR20120089203 A KR 20120089203A KR 20140022705 A KR20140022705 A KR 20140022705A
Authority
KR
South Korea
Prior art keywords
safety
function
situation
safety guard
application
Prior art date
Application number
KR1020120089203A
Other languages
Korean (ko)
Inventor
최재용
Original Assignee
최재용
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 최재용 filed Critical 최재용
Priority to KR1020120089203A priority Critical patent/KR20140022705A/en
Publication of KR20140022705A publication Critical patent/KR20140022705A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements

Abstract

The present invention is a technology related to a safety keeper using a pre-registering device to prevent a crime beforehand. It is composed of external terminals or application types such as a security solution application, a cc camera application, or smartphone application and they are individually or collectively used. The invention is developed to focus crime prevention by overcoming the problem that a former safety keeper cannot affect in preventing a crime. The safety keeper using a pre-registering device can keep the safety of a user as the user registers usual states such as time, jobs, places, and the likes through a navigation device so that the device checks the identity between them or the user registers a usual safe state such as an environment, surrounding people, degrees of noise, voices, jobs, device operating methods, languages, and others beforehand so that the device takes a predetermined preventing action before the event of a crime. In other words, the action is to call police officers, call the surrounding people, call the parents, generate a warning sound, and others. In addition, the safety keeper is manufactured in an application type of a mobile phone, or an external terminal type and can be provided in the types of application for the cc camera, the application of the security solution, or sub device. The expected effects of the invention are to prevent crimes regardless of targets and to prevent crimes by supplementing former functions of the former safety keeper such as an extra terminal, cc cameras, security solution, and others. [Reference numerals] (AA) Safety keeper state table; (BB) First time : 00:00-02:00; (CC) Path; (DD) Confirmation data; (EE) Risk; (FF) Emergency; (GG) Confirmation; (HH) Contact; (II) Weekday type; (JJ) Holiday type; (KK) Special type; (LL) Event type; (MM,OO,QQ,SS) Routine; (NN,PP,RR,TT) Performed work; (UU) Photo; (VV) Voice; (WW) Noise; (XX) Language; (YY) Device

Description

 The safety keeper using the pre registry system}

The present invention relates to a 'safety guard using a pre-registration device' for preventing a crime in advance. More specifically, safety guards to prevent various crimes and accidents occurring in modern life are technologies related to terminals and applications.

Conventional safety guards have various types such as safety guards using personal terminals, cc cameras installed in public places, security systems installed and managed by various security companies, and electronic anklets for sex offenders and convicts. Most of them are used for criminal tracking or case resolution, so there is a limit to their use, and the effects are insignificant.

In order to protect women or children from sexual assault, kidnapping, or other crimes, safety guards using mobile phones or personal terminals are required to notify parents or designated organizations of texts or phone calls in case of crimes using mobile phones or separate terminals. It was a way to inform.

Since the conventional technology is mainly used to contact after the incident, it is not effective in preventing accidents, and even after an accident, there is a limit that it becomes useless if a criminal takes the victim's terminal and turns off the function or discards the terminal itself.

 Fortunately, even if the terminal is not stolen, it is not easy for the victim to contact the emergency button by pressing the emergency button.

In addition, since various cc cameras installed for crime prevention are installed in a certain place and only photographed in a predetermined manner, there is no preventive effect other than forcing a criminal to commit a crime in the place due to the device.

 In the event of a crime in front of the camera, the camera will not contact the person concerned and will not do anything to prevent the crime. It was only to do the work after the incident to examine the video materials again and again with the labor and effort to find out the facts or traces of criminals.

In addition, security systems installed by various security companies to prevent crime cannot be concealed if the offender commits a crime and runs away before the party's dispatch time. In addition, if the criminal is an inmate or an insider of the organization, there are loopholes that can be made through a network or by entering a password that he knows and commits a casual and safe crime. In this case, it also has the adverse effect of helping crime.

For this reason, even if there are various safety guard devices such as safety guard terminals, cc cameras, and various security systems (hereinafter collectively referred to as safety guards), crimes such as sex crimes and robbery are increasing day by day.

In addition, the electronic anklets, which are filled by sexual assault criminals and other convicts to prevent recurrence, also have no preventive measures in addition to the communication function, and they are committing second and third crimes even when wearing these, and there is no alternative to prevent them. Is anxious, and it is true that the country is helpless.

All the people are making every effort to keep their safety and my family and my brothers' property safe, but there is still no answer, and good citizens remain exposed to these damages.

 It is a pity that no one has prepared clear preventive measures in such a situation, which is greatly threatened by modern life.

 Literature Introduction

[Document 1] Makesafe, Jeon Hyun. 2005.03.30

    Application No. 10-2005-0026519 (March 30, 2005), final status: withdrawal

Document 2 kr 10-1104081 A 2011.11.23. SAFE CARE SYSTEM WITH GUARDIAN Kang Won-ho and 2 others registered for final status

The present invention is to overcome the limitations of the conventional safety guard and to provide a device that can literally prevent and protect the event anytime, anywhere.

In order to achieve this purpose, the 'safety guard using a pre-registration device' is proposed.

Crime usually involves the criminal finding and contacting the victim, the criminal approaching the victim, the criminal and the victim moving together, the criminal threatening the victim and his family, and the criminal actually committing the criminal act. It can be subdivided into the back. At this stage, the safety guardian separately identifies the safe and dangerous situations, registers the necessary requirements in advance, measures the level of danger before the situation arises, and automatically contacts the person in charge at the boundary immediately or generates a beeping sound. They try to prevent incidents by taking action, or by combining two or more methods, such as contact.

Of course, crimes go through these steps as they are, but sometimes they happen suddenly, and some of them are omitted. However, it is best to detect and prevent any incident as soon as possible prior to the crime.

The safe and dangerous situations are described in the steps listed above when (time), where (place), with whom (subject), what (what), how (tool, situation, method), etc. It is to analyze the life in advance to register a safe situation or to register a dangerous situation in advance if necessary, and to take precautions by judging the risk according to the degree of conformity or deviation.

In addition, if a mobile phone terminal is taken away or a spare terminal is prepared in case of a malfunction, it is hidden in a place where it is invisible, in a safe place that only one knows, and each device operates or complements each other, or operates in an emergency when one device stops. The alternative is to provide a more complete 'safety guard' for a safer life by operating two terminals.

It also adds a safeguard function to the function of the electronic anklet, which is provided as a means to prevent recidivism by sex offenders or other convicts, or as a means to provide them with certain penalties, allowing only activities on a predetermined route and pre-registration. When you go to a path that has not been approved, you can prevent the 2nd and 3rd crimes by getting permission in advance. If you leave the path registered without permission, you can go out to prevent crime. It is to reduce the crime rate of society as a whole by preventing criminals from repeating crime.

1. Safety guard using personal mobile phone or separate terminal

  Safety guard using a personal mobile phone is a technology that implements safety by using a function that protects safety through a personal terminal that can be used in an age group where an application or a mobile phone is difficult to use, or by complementing each other. In consideration of the above steps, the user inputs safety conditions such as time and place, and how he interacts with those around him, and immediately before reaching the risk threshold based on the registered conditions. By sending a text message or other method to the person specified in the above, an alarm is sounded, or by contacting a person close to the current location (hereinafter referred to as preventive measures) to prevent the incident.

Examples of safety conditions to register in advance are as follows:

1) Route Registration: Register a place at a specified time

 The most important and key pre-registration in the present invention.

It is to register the route by connecting the movement of the place and the time according to the daily routine in advance. It is. By using the location tracking function of time and GPS, the degree of correspondence is recognized, and the dangerous situation is monitored and contacted according to the time and distance deviated from the degree of agreement.

The route can be divided into weekday type, holiday type, event type, special type, etc. according to the user. In addition, the route can be diversified if necessary and the user can modify the schedule in advance at that time.

2) Person Registration

  Events usually occur off the path, but sometimes the reality is that events can occur unexpectedly while doing normal work on the path.

  It is very important that the person is registered because the event is committed by a person.

 Persons shall be registered by dividing them into safe people, people of interest, and dangerous people.

 The safe person may be registered differently according to a path such as family relatives, neighbors, and friends. In each route, register people who can normally meet or who can meet.

Among the characters of interest are those who are considered to be dangerous even if they are neighbors, such as bad friends, neighbors, bums, school-chans, and bullies.

 A dangerous figure is to register a person who has previously been identified as a former convicted sex offender.

 There are several ways to register people: photos, voices, personal information, and so on.

A) Photo

   Register photos of safe people, people of interest, and people of danger beforehand.

B) Personal information, e-mail address, address, telephone number

  Maintain personal information, address, phone number, e-mail address, etc. centering on safe people to determine whether they are safe contact. If an unregistered person suddenly appears several times in a text, phone or e-mail, it is regarded as a caution, and if it is suspected, he / she should take precautionary measures as a dangerous situation.

C) voice, waveform

  Fixed voice and suspected voice

Using voice recognition technology, the voices of safe people around the safe place are registered as voices or waveforms from time to time, and people of interest collect data as much as possible to register in advance as possible. It is advisable that risk figures should be inputted to the maximum extent possible, but replaced with commonly provided data.

  3) Background registration: It is divided into safe background and background of dangerous background.

 A safe background is to register your daily life as you go, such as learning scenes, school trips, and playing scenes.

 The background of interest is unexpectedly too many people or too few people in the path, the noise is above or below the usual noise level, or behaves differently than usual.

  The danger background registers assault scenes, sex scenes, scenes of cryptic place features, situations in which knives, clubs, screams, etc. appear.

Examples of background registrations are as follows.

A) Scene: To register a safe scene, a scene of interest, or a scene of danger.

B) Number of characters: safe characters, number of characters of interest, number of dangerous characters

If you do the job at that time, the number of characters is usually fixed.If you go beyond this, the number of people around you may be less than you expect, or more than you expect.

4) What to do

It is to register the work to be done by each path into safe, normal, and dangerous work. It is possible to register a safe, stationary work and also to register the expected and dangerous work.

In criminal situations, the actions and things of users are different from usual. In general, when a user's actions or actions are registered at that time or place, and a different thing or action is performed, such a situation is detected as a surrounding situation or a dangerous situation, and precautions are taken.

 5) Register terms or sentences

: Register in safe, normal terms, in critical terms, and in dangerous languages.

Crime-related profanity, violent language, threatening language, attracting language, etc. are registered in advance, and if such language is recognized more than a certain number of times, it is recognized as a dangerous situation if it is more than caution.

 5) Mobile phone working status:

A) Encryption operation

It is to distinguish between the operation of the safety situation and the operation of the surrounding situation. The operation of the safety situation is usually performed by the user using a password.

Risky operations are terminated by either not performing this encrypted process, or by entering a password and forcibly turning off or turning off the power.

In the event of a crime, the offender will usually take the phone off and turn it off, either by turning off the power or by removing the battery at all, which is a way to distinguish whether the user is willing or forced. .

 B) Call status such as calling number, call duration, frequency

A secure number is a case where a pre-registered number is displayed. A caution situation is a phone number without an unknown or calling party number. A dangerous situation is when an unknown number other than the registered number is a telephone call for a certain number of times or more. Even if a number is called, it is a dangerous situation to register a phone call or a long time, which is different from usual times.

 6) A cryptographically agreed path: To establish a fixed path that can be changed by agreement.

Depending on the situation, you can set up a double or triple password so that you can't solve it by yourself. This can be registered by the employer and family in advance.

This is to prevent the user from doing bad things against the happiness of the family.

For example, after 12 o'clock in the night, you agreed to sleep at home and set up a fixed route. In any case, it is right to sleep at home. However, even if one of the couples tries to break, cheat, or do something bad, they will not be able to sleep elsewhere without their consent.

 If you break this and force it without agreement, it is considered a dangerous situation so that you cannot prevent precautionary measures, such as making a phone call to your family or contacting the police, to break your family's happiness.

 In order to prevent too much contact and disruption of work, you can choose to make a step-by-step or direct connection, such as the primary parent or secondary agency, depending on the score.

  You can also include a feature that allows parents or others to locate your child if needed to check their child's safety. In this way, it is possible to check each other in both directions, so it will be a safer guardian.

In more urgent situations, it also generates a direct alarm so you can get help from the people on the spot.

One method may be to select and delete items in advance by selecting the above registration requirements for each step.

  2. Safety guard using cc camera

 Similarly, cc cameras are built and installed with applications that function as described above, and when safety thresholds are reached, they automatically contact a designated agency immediately to prevent crime.

The pre-registration condition is to set the cc camera. For example:

1) Criminal Face

2) normal behavior for the location and time of day;

3) the number and duration of normal behavior

4) sound frequency and noise level of normal behavior

5) Expected scene of safety situation

6) Specially anticipated danger situations and scenes

3. Safety guard using security device

Safety guards using security devices can be solved by installing additional systems that distinguish outside and inside safe areas, in addition to current functions.

In other words, in addition to the design of secom or other safety devices in the safety area, cc cameras with safety guard applications installed outside or inside the area are installed together, and the anticipated crime situation is registered in advance. It is to be able to contact you automatically.

 An example of pre-registration is as follows.

 1) Names, photographs, personal information, voices, and physical conditions of employees and related persons, prospective visitors

 2) Normal situation in time and place

 3) the number and duration of normal behavior

 4) sound frequency and noise level of normal behavior

 5) Expected scene of safety situation

 6) Specially anticipated crime situations and scenes

 7) Convicts and Dangerous Persons

 8) Duration and frequency of suspected situations and scenes

The pre-registration described here is an example and can be added as many as the situation or purpose.

4. Safety guards for convicted sex offenders

  Incidents are always human causes. In particular, just preventing the recidivism of past convicts can reduce the extent of crime.

Nowadays, people are wearing electronic ankles to prevent these crimes, but they are still committing crimes.

In order to prevent this kind of crime, the pre-safety function is added to the electronic anklets. Thus, we define a dictionary path within the range allowed by the criminal and only allow movement within that path. Of course, it is also absolutely necessary to diversify the route as much as possible to ensure safety and change it to a pre-licensing system.

By designating the paths that are allowed in advance, criminals can contact the person in charge or the surrounding police officers to prevent incidents in advance when they go outside the designated path.

The commercialization of the present invention will enable everyone to lead a safer life, as revealed in the object of the invention, and can greatly contribute to lowering the crime rate by preventing crime in advance and, in particular, by preventing the recurrence of criminal convictions. .

It can also fundamentally block not only family crimes but also bad things for family happiness.

1 is a safety guard situation table
2 is a daily life path (weekday type, holiday type, special type)

The present invention will be described in detail with reference to the accompanying drawings, examples of which can be easily realized by those skilled in the art. This description is an example to the last and may include changes and modifications later, even in this case, the basic technology belongs to the present invention.

1. Details of drawings

(Figure 1) is a safety guard situation table.

In this way, modules such as 10 minutes, 20 minutes, 1 hour, and 2 hours can be determined and modularized for each unit time.

The confirmation method is as follows.

end. Check the check points once every 20 minutes. (The time is adjustable, but if it is too short, the power consumption is so bad.)

I. The route alerts the user every 5 minutes (configurable) from the start of the exit, and then reaches the designated risk situation if it lasts 15 times (individually) three times.

All. Photo data can be uploaded and deleted at any time by registering photos related to the situation (5 levels of safety, caution and danger) in advance.

    2 is a daily life path. As shown in the figure, it is usually displayed in red color on the map like the destination selection function of navigation and the work and time are displayed.

20 is 'weekday type' and can be diversified like weekday type 1 and weekday type 2 or by day of week.

21, 22, 23 ---- 38,29, etc., by modularizing by place and time, it is possible to register the safety and risk situations as shown in FIG.

For example, the 21 module is described as follows.

 A) place: house

B) Location: Number of apartments, 00, 509, Amsa-dong

C) What to do: Sleep

D) Situation: Photographs, family, snoring sound, home environment, family voice, noise level, and device operation status are displayed in tabular form as shown in Figure 1.

30 is a holiday type and can be changed according to plan.

40 is special and can be changed according to plan.

       50 is a part of the route that is fixed.

          2. Registration and discrimination data (number can be set individually)

When introducing the safety guard of the situation table (Fig. 1) by item as follows.

end. Route

 1) The route is the most important registration as it checks the degree of agreement as time and place changes.

 2) It is divided into stop position and moving position, and when the position is changed over 100m in case of stop position, pay attention that it stops for more than 10 minutes at the movement position, and recognizes if it is stopped for more than 20 minutes Let's do it.

I. Checklist

 1) pictures

 A) Safety: Parents' relatives, relatives, other albums, school friends, teachers, time zones, neighborhood

 B) Caution: Photo and location of dangerous place

 C) Risk: registration of confectionary photographs, tools used for crimes, and the external characteristics of the offender

 D) Determination: When the path is off and the dangerous place and location are recorded more than once, and the registered as dangerous picture is recorded.

 Detect and contact as dangerous

2) Voice: Register at any time by phone, record at any time

 A) Safety: Voice of parents, voice of relatives, children, school friends, teacher registration, neighbor's voice,

 B) Attention: first voice

 3) Danger: If you hear more than 3 times of voice record, screaming, screaming, recording of same voice

 D) Determination: In case of hearing the registered confectionary voice, screaming or screaming, if the first voice is recorded more than 3 times in 5 minutes

3) Noise level: According to the route, specify the normal noise level for each recording point.

 A) Safety: Safety when noise occurs within the registered range

 B) Caution: When the noise level is registered on the boundary line among the registered registration range

 3) Danger: If the noise level suddenly changes or goes out of bounds

 D) Determination: A dangerous situation that lasts for more than 1 minute or falls within the danger range on the boundary line.

4) Language: Register dangerous language, rants, swear words, gossip, solicitation, decoy, mobile suggestions, etc.

  Let's go. I will give you 00. Who waits. You should do this. You are good Register expected language such as

 A) Safety: When no dangerous language is recognized

 B) Caution: When the dangerous language comes out less than 3 times of recording time

3) Danger: If the dangerous language sounds more than 3 times during the recording time

5) Device: It is considered to be a dangerous situation when a user performs a task by passing a password or performing a process by turning on, turning off, sending a text, etc.

 A) Safety: In case of normal operation at scheduled time and place

 B) attention; If it worked in the usual way, even if it's an unexpected time and place

 C) Danger: If you want to work outside of the scheduled time and place and suddenly work in the usual way

 D) Determination: Determining the moment when the power is suddenly out of the scheduled time and place as an emergency, immediately contact the application immediately before turning off

      It is encrypted and can only be changed if all the ciphers of the agreed person are present.

If a pre-registered route or time deviates, precautions will be taken, and even if they do not deviate from the same time route, criminals may be approached to the place and crimes may occur.

2. Details of application production method and process

end. Ready :

1) Path Analysis

Make tools to register time and work in advance based on moving places.

 As shown in Figure 1, the tool pre-writes best practices in advance on weekday paths, holiday paths, special paths, arbitrary paths, and fixed paths, and allows the user to customize them.

The weekday route is the route most commonly taken on a weekday schedule.

Holiday routes are routes on Saturdays, Sundays, national holidays, and other holidays.

The special route is a route that can be determined and executed at a special day or event.

The arbitrary path is a path that can be arbitrarily changed at that time.

A fixed route is a route that can only be changed by agreement or consent. The fixed or arbitrary form may correspond to the whole day, but it will mainly be part of the path. Fixed termination can be solved with a cipher.

2) Pre-registration

Once the route is determined, each route is subdivided by time and place, and each unit module is named and registered as a normal situation, a critical situation, and a dangerous situation.

Safety factors by analyzing people who can be together with each other, the people they can meet, their voices, the level of noise around them, the scenery, the main scene, the number of people they meet, the terms used, the voices, the level of noise, and how to operate mobile phones To register.

The registration of a person registers personal information such as name, address, e-mail, photos, etc., and a voice waveform. Since a crime is caused by a person, the registration of the person is very important. The ambient noise level is registered in advance by setting the normal range, and the scene that can be photographed by the mobile phone in the normal state is registered in advance.

Mobile phone operation method requires special registration and special management because most of the criminals take the mobile phone in case of crime.

The user registers the operation in a way that only the user knows when turning the mobile phone on or off, or sending a text message. And it usually works in an encrypted way.

In this way, the normal operation method is automatically registered as a dangerous situation, and if a crime occurs, the criminal can detect and contact the dangerous situation immediately if the criminal tries to operate in the normal way.

Of course, additional registrations can be made from time to time in case an unexpected person or event occurs.

The situation of interest can be determined by the user or parents according to the deviation from the above safety situation, which is also designed to change and use best practices in advance for convenience. For example, two or more unregistered people (recognized by face or voice) appear. If an unregistered voice appears in the recording for 2 minutes or more, the noise level suddenly increases, the path deviation or the time deviation continues for more than 5 minutes, and so on, so that sufficient space is provided for the user to further register.

The dangerous situation is to register a convict's face or voice, intimidation, abusive language, or twisted content so that if such a situation is reproduced, he or she will be contacted immediately.

As mentioned above, when the phone is turned on or turned off, it is also registered as a dangerous situation when it works in the normal way when sending texts.

I. Monitoring function setting

Monitoring refers to a function that can monitor the situation at a certain time, a change of location or a combination thereof based on the registration data. The monitoring method can be slightly different depending on the registration factors.

 The route identifies the degree of mismatch and deviation from the location information of the GPI and the pre-registered location, time, and work.

 Other factors monitor the situation at intervals or segments defined by pre-registration criteria. The monitoring method can be the same or set differently for each segment.

For example, the voice records the waveform or content every three minutes and analyzes the recorded content with the registered data to check for abnormalities. The noise level is measured by measuring the noise level with a noise level measurement program. Phone numbers or e-mail addresses are identified by the presence of pre-registration data, and the use of terms is also monitored by analyzing whether the term is not in the pre-registration data. The scene determines whether a photograph or face is a pre-registered scene, and the surrounding objects are also checked by registration. For example, a knife is registered as a dangerous object, and when it is photographed it is used to monitor the dangerous situation.

In this way, pre-programming is performed to monitor the situation by segment and by segment, and it is designed to be divided into safety situation, attention situation, and danger situation.

In order to save power, monitoring is performed at regular intervals, and the previous data is deleted to minimize application capacity, and the monitoring time and interval can be adjusted by users according to the safety level.

All. Danger signal call function

Hazard signals can be made by contacting a designated contact, such as a parent, school, or police station, at a fixed level (Phase 1, Level 2, etc.) or by beeping or asking the people around you to signal the next action. It means taking action to let the device perform an action such as change.

It can also be contacted through one or two or more complex methods and steps, depending on the configuration, and is also designed to be set up and implemented by the user.

la. Parental confirmation function

In this way, even if the user's situation is frequently sent to a guardian or related person, a risk may occur due to a device abnormality or other factors, so that parents can set up a networking function so that parents can grasp the user's status by a certain interval or when necessary. Put it.

3. Details of the case

 end. Cases for General Accident Prevention

In general, a smartphone user can download and use a smartphone's safety guard application.

After down, register the pre-registration according to the movement route, and check it every 5 minutes (optional setting) every 20 minutes. The application checks the deviation of the path by 5 minutes at 20 minute intervals, performs actions such as voice recording, video recording, and term analysis, and compares with pre-registration data. If it is considered a dangerous situation set by the user, the guardian will be contacted by text. Even if it is not checked, if there is a sudden dangerous situation such as danger of cell phone operation or noise, the guardian is immediately contacted. Not only you but also your guardian can now live with confidence and live a more regular life.

Parents sometimes worry when their child's safety situation is linked with the child's mobile phone through the application to check the location of the child, check the action according to the plan, and grasp the degree of risk.

A suspected criminal on the way out of school approaches and whispers something. The application recorded this person's voice and found it to be an unregistered person, and noticed that it was an appeasement in the registered appeasement language. A video and a recording were sent to the parents, and the parents checked and contacted the police with the location information.

During the appeasement of the offender, the police come and the crime plan is thrown back and the child can prevent the accident.

 I. Fixed Path for Family Happiness Keeper Function

Couples should live in love and trust. Sometimes it is broken and one of the couples cheating or doing something bad and the family is destroyed. It is a function to keep the happiness of the family by setting a fixed path that can be established only if the couple agrees on the path under the agreement.

For example, 12 am to 6 am to set a fixed route called home so that you can't change it for 2 hours. This allows couples to come home at 12 o'clock in any case unless an agreement is reached. Of course, if something happens beforehand in the dictionary, the password is provided so that the path or time can be changed.

It is also possible to establish a family day by checking the fixed route in this way with the children as well as the couple, and in this case, all the members of the family can gather together to make a time for the damage.

4. Specific contents related to application program

 end. cc camera application

This application is applied to cc camera to work together. Of course, the user must register with the pre-registrant and connect directly to the police or officials if a dangerous situation is detected.

This way, the cc camera will not only be shooting, but if a dangerous situation is encountered in the vicinity, it will become a reporter and reporter immediately.

In addition, the alarm sound will be a great help to prevent the crime because the criminals are to escape by themselves or caught by the people around the police.

Security system application

Similarly, by installing several cc cameras outside the security system to report as above, and in urgent situations to raise the alarm sound so that the criminals can run away by themselves or sleeping by people around.

In addition, these devices will also be placed inside security facilities, and alarms will be sounded as soon as they are invaded from the inside, or they can be dispatched immediately to the fastest police officers, thereby increasing their utility.

 All. Separate terminal application

If it is difficult to use a mobile phone will provide a separate terminal. A terminal with this function will be made and provided. This terminal is made to be used in a small place difficult to find because it is less effective when taken by the criminal.

In that it is a separate terminal, a terminal with a separate chip and program is manufactured, but since the Ep function of the smart phone is implemented separately, a separate description is omitted.

However, in the case of losing or losing an existing mobile phone, it is possible to operate as a complementary or supplementary means in case it is difficult to take a picture with the mobile phone so that the safety guard can perform the use more efficiently.

In addition, when it is difficult to use a mobile phone due to age, only the terminal can be a safety guard function.

la. Safety guardian for convict sex offenders

In order to prevent them from repeating their crimes, the electronic ankles have a safety guard function that allows them to live within the national route. Thus, it defines a dictionary path within the range allowed by the criminal and only allows movement within that path. Of course, it is also absolutely necessary to diversify the route as far as possible to ensure safety and to change it to a pre-licensing system.

By designating the paths allowed in advance, criminals can contact the person in charge or surrounding police officers to prevent incidents when they go to areas other than the designated paths.

skip

Claims (7)

By pre-registering the information related to the criminal situation or the information of the usual safe situation in advance, analyze the degree of agreement or inconsistency between the pre-registered information and the current situation information, and take precautionary measures when the situation reaches a certain standard. Safety guard terminal using a pre-registration device that includes a function to enable preventive measures as well as a safety guard terminal manufactured separately for such a function. Regarding 'claim 1' above, the pre-registration information is defined by the developer or added by the user such as the scene, face, personal information, voice, count duration, schedule, operation status of the device, password, etc. The safety guard using the pre-registration device, which includes the function that can be determined by the method of modifying the information, and the function to prevent the preventive action when the situation reaches a certain standard, can be performed. Safety guard terminal It is a device implemented in a conventional personal terminal or a security facility such as a mobile phone, cc camera, and Secom. When a situation that reaches a certain standard occurs, the preventive action can be taken according to predetermined precautionary measures. Safety guard terminal using a pre-registration device that includes a function and a safety guard terminal manufactured separately to enable such a function Safety using a pre-registration device that uses a combination of auxiliary terminals that start or operate in case of device seizure or loss or to increase safety efficiency. Safety guard terminal designed separately for guardian application and such function
In order to protect the happiness of the family, the security function using the pre-registration device, which includes a fixed path that can be changed only after all of the agreed-upon passwords have been entered for a certain path or time and set a password function under family agreement, can function with the application. Safety guard terminal
Precautionary measures prescribed in relation to Claim 1 above may be made to contact parents, police officers or other persons, in case of an emergency, to contact a person near the current location, or to generate a warning sound. This function allows you to take possible precautions, including safety guards using pre-registration devices that include these functions, and safety guards designed separately to enable such functions.
Safeguarding the functionality of the electronic anklet, which is provided as a means of preventing the recidivism of sex offenders or other convicts, or as a means of providing them with certain penalties, adds a function to allow only activity on a predetermined route and is not pre-registered. Safety guard using a pre-registration device that includes the ability to prevent secondary and tertiary crimes in a way that allows permission in advance when the route is not taken, and the safety guard terminal produced separately for such functions.
KR1020120089203A 2012-08-15 2012-08-15 The safety keeper using the pre registry system KR20140022705A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020120089203A KR20140022705A (en) 2012-08-15 2012-08-15 The safety keeper using the pre registry system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020120089203A KR20140022705A (en) 2012-08-15 2012-08-15 The safety keeper using the pre registry system

Publications (1)

Publication Number Publication Date
KR20140022705A true KR20140022705A (en) 2014-02-25

Family

ID=50268572

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120089203A KR20140022705A (en) 2012-08-15 2012-08-15 The safety keeper using the pre registry system

Country Status (1)

Country Link
KR (1) KR20140022705A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015152475A1 (en) * 2014-04-04 2015-10-08 김명환 Personal protection service system and method
KR20170010585A (en) 2015-07-20 2017-02-01 한화테크윈 주식회사 Wearable camera
WO2020096097A1 (en) * 2018-11-09 2020-05-14 주식회사 일 Method for sharing user state information and device for same

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015152475A1 (en) * 2014-04-04 2015-10-08 김명환 Personal protection service system and method
US9892625B2 (en) 2014-04-04 2018-02-13 Myung Hwan Kim Personal protection service system and method
KR20170010585A (en) 2015-07-20 2017-02-01 한화테크윈 주식회사 Wearable camera
WO2020096097A1 (en) * 2018-11-09 2020-05-14 주식회사 일 Method for sharing user state information and device for same

Similar Documents

Publication Publication Date Title
US8630820B2 (en) Methods and systems for threat assessment, safety management, and monitoring of individuals and groups
US8665089B2 (en) Personal safety mobile notification system
US9547977B2 (en) Systems and methods for automated personal emergency responses
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US9572503B2 (en) Personal safety and security mobile application responsive to changes in heart rate
CN104484985B (en) A kind of safety alarming method, terminal, public security system and security alarm platform
CA2880597C (en) System and method of alerting central monitoring station and registered users about a potential duress situation using a mobile application
US20150230072A1 (en) Personal safety mobile notification system
US20170169699A1 (en) Systems and methods for automated personal emergency responses
US8928479B2 (en) Security system with automatic alarm
US20130040600A1 (en) Notification and Tracking System for Mobile Devices
CN101095178A (en) Mobile wireless transmitter having emergency notifying function, emergency notifying device, and emergency notifying system
US20160100301A1 (en) Method and system for generation and transmission of alert notifications relating to a crowd gathering
US20080139165A1 (en) Disaster response system for conveying a situation status and location of subscribers and for initiating preconfigured response plans
US20140120977A1 (en) Methods and systems for providing multiple coordinated safety responses
CN103702008A (en) Mobile phone emergency calling system
Prashanth et al. Research and development of a mobile based women safety application with real-time database and data-stream network
CN110910607A (en) Intelligent alarm terminal
CN104580685A (en) Terminal state processing method and device
US9699401B1 (en) Public encounter monitoring system
US11704995B2 (en) Systems and methods for emergency event capture
US10390196B2 (en) System and method for contacting emergency services
KR20140022705A (en) The safety keeper using the pre registry system
KR20110086211A (en) Method and system for preferentially connecting designated receiver of emergency call
WO2015036926A2 (en) Networked devices and methods for personal safety and security

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application